Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Enjoyoors user experience is effortless: Users deposit funds in protocol vaults, receive yield weekly, and request withdrawals anytime. While this might look similar to regular yield aggregators, it has fundamental differentiators: Users can earn a yield on almost any asset across a wide range of blockchain networks, while the protocol introduces a brand-new asset class, synthetic gigaAssets, that act as a proper yield proxy.
The actual ‘magic’ happens on the backend, and we call it rehypothecation. This process essentially boils down to unifying user deposits by minting gigaAssets and maximizing receivable yield through deployments of gigaAssets into broader DeFi verticals. Enjoyoors abstracts all this complexity from users, handling it on the protocol level. Let’s explore how rehypothecation works and see why user abstraction is the central pillar of protocol stability.
Enjoyoors — Omnichain liquidity for dApps, Yield for Enjoyoors
This paper gives a comprehensive overview of the Enjoyoors protocol, including its architecture design and key details of its implementation. Enjoyoors establishes a foundational infrastructure that liberalizes access to liquidity for a wide range of DeFi players.
All the protocol stability mechanisms discussed above are built upon a foundation of fundamental rules and parameters. These benchmarks are defined by a risk management framework that helps revisit all parameters every epoch and apply qualified adjustments if needed. These measures will allow the protocol to effectively control the stability of gigaAssets and the solvency of the entire system in the short and long run.
Let’s consider all the risks the Enjoyoors protocol addresses and identify respective strategies and rules for mitigating these risks.
Enjoyoors secures LP risks of users depositing funds into Giga CDP by covering potential losses with its insurance pool. To maintain liquidity in the insurance pool, the protocol collects InsuranceFee, a cut of all yield generated in the protocol.
There are two main risks the protocol avoids via insurance:
Slashing risks in protocols where gigaAssets are deployed
Risks of hacks resulting in losses of gigaAssets
In both cases, a user can expect compensation from the insurance pool to cover the loss of initially staked funds. If the insurance pool is insufficiently liquid, the protocol uses its native token treasury to cover potential losses.
In the worst-case scenario, if the insurance pool and token treasury are insufficient to cover the losses, users bear the loss collectively. They commit to repaying a fraction of the lost gigaAssets proportionally to their stakes in protocol vaults before being allowed to withdraw their initial deposits from vaults.
A straightforward way to look at Enjoyoor’s entire liquidity is to consider a portfolio of assets where collateral tokens have positive portfolio weights, and synthetic gigaAsset tokens have negative portfolio weights. With this portfolio analogy, we have the mighty modern portfolio management theory at our disposal, where we can build portfolios with different mean-variance characteristics, analyze asset correlations, pairwise cointegrations, and be very flexible regarding the portfolio objectives we target. As an example of a meaningful objective to pursue, consider the following risk optimization problem:
E.g. minimize the portfolio variance where one of the assets has a negative weight (mimicking synthetic debt). To illustrate, we’ve modeled a portfolio of 10 popular ERC-20 tokens and added ETH short to the portfolio to mimic debt in synthetic ETH. Here is how the portfolio performed on the unseen test set:
Interestingly enough, the optimal weight for the ETH short turns out to be around 0.53 or 53%. This is not achievable with collateralized portfolios, as the entire collateral value is only 47% of the portfolio. This is already not a collateral-backed synthetic system, but rather a synthetically hedged portfolio, and is extremely capital efficient. Yet such a portfolio is very hard to manage, as hedging always incurs additional costs. So, initially, Enjoyoors will operate as an overcollateralized system. We then aim to gradually migrate from an overcollateralized system to a hedged portfolio approach as we build liquidity and momentum.
Ultimately, the purpose of the entire protocol is to manage collateral risks and maintain the value of gigaAssets. As a part of this process, we must always ensure that the total value of user deposits adequately backs the circulating supply of gigaAssets. To achieve this, the protocol monitors portfolio LTV and takes corrective actions to restore it to the target level if LTV deviates outside acceptable ranges. Here are the protocol parameters that define its risk tolerance:
Parameter
Level
Defined by
Description
TargetLTV
Giga CDP
Governance
LTV level the Enjoyoors protocol targets for the entire collateral portfolio
DeltaLTV
Giga CDP
The protocol's stability hinges on two critical areas: portfolio management and gigaAsset supply regulation. Enjoyoors implements a toolset that far surpasses the capabilities of traditional CDP protocols in these fields. This chapter will examine the key factors behind its effectiveness and explore its precise functionality in detail.
The Giga Collateralized Debt Position (Giga CDP) is the central structural component of rehypothecation. It comprises all protocol vaults, with various assets deposited by users (acting as collateral) and a basket of synthetic gigaAssets issued against these funds by the protocol. The protocol has exclusive control over the Giga CDP, and this management function serves as its primary purpose.
Generally speaking, the concept of CDPs has already been extensively explored by such protocols as MakerDAO (now Sky) and Bitshares. In their cases, CDP functionality is available for any user who locks collateral in the protocol’s smart contracts, mints synthetic stablecoins pegged to USD, and commits to a certain level of collateralization for this newly minted stablecoin debt. The user’s CDP can be liquidated if its collateral value drops below the predefined threshold due to the volatility of collateral assets.
Enjoyoors’ Giga CDP is distinctly different from this retail-oriented approach. See how Enjoyoors compares with regular CDP-based protocols:
Governance
Deviation bands around the TargetLTV. Protocol strives to keep LTV in the [TargetLTV - DeltaLTV; TargetLTV + DeltaLTV] range.
TokenSupplyCap
Vault
Governance
Determines per asset supply cap for each Vault in every network.
Protocol
Who manages CDP?
Users
Protocol
Who manages synthetic debt?
Users
Protocol / DAO
Can mint multiple synthetic assets?
No
Yes
How is the peg maintained?
Arbitrage
Peg Adapters, Arbitrage
Is any insurance mechanism implied?
No
Insurance pool
In summary, the protocol manages Giga CDP of Enjoyoors instead of retail users, and the effectiveness of this management substantially elevates protocol stability. The exclusive control after the synthetic supply enables a risk management toolset that is much broader than any regular CDP protocol. We will discuss this in the protocol stability section.
Criteria
Regular CDP protocols
Enjoyoors
Who opens CDP?
Users
Enjoyoors achieves protocol stability and solvency through gigaAsset supply regulation. Supply regulation is an automated portfolio LTV management where the algorithm evaluates key LTV parameters across available assets and makes decisions regarding gigaAsset mints, transfers, and burns accordingly. Enjoyoors tracks the following LTV parameters:
Parameter
Defined by
Description
MarketLTV
Calculation
‘Per collateral’ LTV of the specific virtual market defined as $D$C
PortfolioLTV
Calculation
Current LTV across the entire portfolio. Calculated as i$Di$CI
TargetLTV
Here is a high-level overview of how the algorithm functions in principle:
We keep PortfolioLTV in a [lowerLTVBound; upperLTVBound] band around TargetLTV:
if PortfolioLTV > upperLTVBound: decrease gigaAsset supply so PortfolioLTV = TargetLTV. May involve TWAP wind down.
if PortfolioLTV < lowerLTVBound: increase gigaAsset supply so PortfolioLTV = TargetLTV. May involve TWAP issuance.
We keep MarketLTV below an upperLTVBound:
If the above algorithm fails to find enough liquidity to wind down, the protocol temporarily reassigns an excess synthetic debt to the external liquidity for a fee:
Insurance Pool. Enjoyoors sets aside a fraction of the earned yield to accumulate in the insurance pool, which acts as liquidity of last resort. The pool's permissionless nature allows for further liquidity provision for a fee/rev share.
Protocol token staked in Governance. Under the anticipated tokenomics mechanics, users stake protocol tokens or Token/[ETH] DEX LP tokens to receive veTokens. The protocol may assign synthetic debt to this staked liquidity during adverse market conditions. veToken holders benefit by earning additional tokens through inflation and/or receiving boosted revenue shares (external yield from gigaAssets) when synthetic debt is allocated to them.
As a final line of defense, the protocol may decide to wind down liquidity in gigaAsset AMM pools. Backtesting and simulations in accordance with our risk framework showed that the initial TargetLTV parameter the Enjoyoors protocol will work with is 0.6 with 0.2 DeltaLTV, effectively clipping the LTV levels in the protocol in [0.4 … 0.8] range. The target and the delta will be re-evaluated once per epoch (see the table above).
if MarketLTV > upperLTVBound: decrease CDP debt by re-assigning gigaAsset debt to other markets whose current LTV < average LTV. markets should be doubly sorted first in order of increasing LTV, then in order of decreasing collateral value (e.g. given same LTV levels we prefer to reassign debt to a larger market first). May involve TWAP wind down.
if MarketLTV < lowerLTVBound: increase synth debt so MarketLTV = TargetLTV. May involve TWAP issuance.
Governance
Target LTV level for the entire portfolio. This parameter is evaluated statistically on a rolling average basis across protocol epochs.
DeltaLTV
Governance
Deviation bands around the TargetLTV. This parameter is evaluated statistically on a rolling average basis across protocol epochs.
upperLTVBound
Calculation
TargetLTV + DeltaLTV
lowerLTVBound
Calculation
TargetLTV - DeltaLTV
Enjoyoors protocol requires up-to-date oracle prices to evaluate the collateral tokens and synthetic gigaAssets. Oracles will be integrated into the Orchestrator appchain. Enjoyoors will use several data sources, both public and private, to provide Orchestrator with timely information on collateral and synthetic debt assets. These sources include CeFi exchanges, DeFi exchanges, OTC markets, and our primary oracle providers (Pyth, ChainLink, and Redstone).
Available market data usually provides token prices in relation to USD or USD-pegged stablecoins. Enjoyoors implements adapters that price collateral tokens in corresponding synthetic debt assets and unify pricing and valuation across the system.
The price step and update frequency parametrize Oracle price feeds: By default, Enjoyoors will receive a price update that triggers Giga CDP re-evaluation every hour or if the token's price moves more than 1% (translating to ~ a 1% change in the LTV of the corresponding virtual market).
Recent developments in the RWA space make its exponential surge inevitable in the foreseeable future. Once this sector matures, we can anticipate a rapid influx of real-world value into the crypto market, with a high-level estimation of $16T worth of assets tokenized by 2030. T-bills and other fungible assets are sort of low-hanging fruit, and some developments on top of them are already making waves in crypto (Franklin Templeton’s RWAs are notable examples).
However, things are getting more complicated when it comes to other less ‘fungible’ assets. Most DeFi protocols still find it challenging to adopt these assets due to difficulties in standardizing their valuations and risk assessment. A lack of reliable data feeds that supply accurate and temper-proof data on RWAs adds to this complexity.
The Enjoyoors protocol essentially supports long-tail assets and doesn’t rely on regular DeFi liquidations through collateral sell-offs. Its more flexible design enables unifying non-standardized RWAs and deploying their value as gigaAssets to vanilla DeFi protocols. This approach can facilitate a real breakthrough in RWA adoption across the broader DeFi.
Target protocols are selected by Enjoyoors Governance based on a thorough evaluation of their potential rewards and associated risks.
Before allocating gigaAsset liquidity to target protocols, the Portfolio Management System queries the gigaCDP for details on the target and actual liquidity distribution ratios across different protocols.
To enable seamless interaction with target protocols, Enjoyoors implements Target Protocol Adapters.
The gigaAsset Bridge facilitates seamless transfers of gigaAsset tokens between supported blockchain networks and the ENJ MS. Utilizing the OFT standard from LayerZero, the bridge enables cross-chain transfers by burning gigaAsset tokens on one supported network and minting an equivalent amount on another.
Users are incentivized to transfer gigaAsset tokens across networks for various purposes, such as participating in auctions, settling debts resulting from losses in target protocols, and bridging deposit rewards to different chains.
The Enjoyoors protocol operates a distributed infrastructure across dozens of public blockchains, encompassing major EVM-compatible chains as well as popular non-EVM L1s. Most of these chains host Enjoyoors vaults for depositing crypto assets, while others feature a comprehensive gigaAsset infrastructure. Respectively, the gigaAsset infrastructure comprises the following main components: gigaAsset managers, gigaAsset liquidity pools, and Intelligent Peg Adapters (IPAs).
Vaults Vaults are smart contracts on end-user blockchains that serve as the primary interface between users and the Enjoyoors protocol. Users can deposit or withdraw whitelisted assets, subject to a two-period request-withdrawal system. Withdrawal requests are submitted during the current epoch, but funds are released in the next epoch after rebalancing.
Epochs, initially set at 7 days, balance the need for quick reactions to market changes with minimizing transaction costs and aligning with unstaking periods. If “bad debt” arises from slashing in restaking protocols, it is redistributed among collateral holders, reflecting their role as ultimate yield earners and risk bearers.
gigaAsset Managers gigaAsset managers are smart contracts deployed across supported blockchains to manage gigaAssets. They:
underscores the paramount importance of robust security mechanisms to safeguard the integrity and confidentiality of transactions on its network. To this end, the following strategies are poised to be implemented.
Advanced Cryptographic Algorithms State-of-the-art cryptographic algorithms will ensure the utmost safety of transactions. These algorithms are designed to act as the first line of defense against unauthorized access and cyber threats, providing a secure environment for users and developers alike.
Multi-Layer Security Protocols Additionally, will establish multi-layer security protocols to further fortify the network. This initiative entails the systematic development of barriers at various levels of the platform, providing an additional layer of protection against potential vulnerabilities.
Regular Audits and Security Assessments To maintain the highest standards of security, Enjoyoors Protocol will schedule regular security audits and assessments. These evaluations will be instrumental in identifying and mitigating potential weaknesses in the system, fostering a proactive approach to security that is critical in the blockchain sphere. The list of audits will be provided here once published in the project's Github (TBA).
The orchestrator is the central hub of the Enjoyoors protocol. From an architectural standpoint, we envision the orchestrator as an application chain that hosts and manages several core elements of the Enjoyoors protocol:
Giga CDP which controls the supply and the distribution of gigaAssets.
Portfolio Management System manages the Giga CDP in a semi-automated fashion according to governance-set risk objectives. It also decides on synthetic portfolio rebalancing based on governance-set target protocols and allocation weights. Makes synthetic supply management decisions based on governance-set risk parameters (LTV target and ranges, collateral supply caps).
The architecture of the consists of four fundamental layers: Execution Layer, Data Layer, Consensus Layer, and Settlement Layer. Each of these plays a crucial role in maintaining the protocol's efficiency, security, and scalability.
Execution Layer This layer is responsible for executing computations on the blockchain. Within the Enjoyoors ecosystem, it efficiently processes transactions and executes smart contracts while ensuring security and performance.
Data Layer The data layer handles the storage and management of all information within the blockchain network. Key aspects of this layer include data integrity and accessibility. By leveraging decentralized storage networks, this layer enhances redundancy, retrieval efficiency, and overall security, which contributes to the scalability and reliability of the ecosystem.
Consensus Layer This layer is essential for maintaining the security and integrity of the blockchain. It defines the validation rules and processes for adding new blocks to the chain. Given Enjoyoors’ interoperable approach, selecting a consensus mechanism that enables cross-chain communication is a strategic priority. A hybrid consensus model, combining Proof-of-Stake (PoS) with additional consensus methods, is under evaluation to ensure both security and seamless cross-chain transactions.
Settlement Layer The settlement layer is responsible for the finalization of transactions within the blockchain. In an interconnected environment, this layer must be robust to facilitate fast and secure settlements across multiple chains.
This section describes components of the Enjoyoors protocol deployed onto public blockchain networks. These components facilitate protocol operations for end users and interactions with broader DeFi.
Blockchain Networks component list:
Enjoyoors protocol requires up to date oracle prices for valuation of the collateral tokens and synthetic gigaAssets. Oracles will be integrated into the Enjoyoors will use several data sources, both public and private to provide timely information on collateral and synthetic debt assets to the orchestrator. These sources include CeFi exchanges, DeFi exchanges, OTC markets as well as our primary oracle providers: Pyth and ChainLink.
Available market data usually provides token prices in relation to USD or USD-pegged stablecoins. Enjoyoors implements adapters which price collateral tokens in corresponding synthetic debt assets and unify pricing and valuation across the system.
Oracle price feeds are parametrised by the price step and update frequency: By default, Enjoyoors will receive a price update that triggers re-evaluation every 1 hour or if the price of the token moves more than 1% (translating to ~1% change in LTV of the the corresponding market).
Collect rewards and periodically auction them for gigaAssets.
Handle “bad debt” from slashing or hacking by redistributing it among collateral holders.
gigaAsset Liquidity Pools (AMMs)
Stableswap AMM Pools, seeded by Enjoyoors in conjunction with LPs, provide deep secondary liquidity for gigaAssets. Pools are incentivized through internal (token incentives) and external (gauge voting) mechanisms. Users and the protocol share LP tokens, which can be auto-staked in Enjoyoors or earning yield via Convex.
Intelligent Peg Adapters (IPAs) IPAs are specialized contracts maintaining gigaAsset peg stability by managing a pre-allocated supply of gigaAssets. They interact with liquidity pools based on the following criteria:
Provide gigaAssets: Allowed if the price is consistently above 1.0 and within a deviation range compared to oracle prices.
Withdraw gigaAssets: Allowed if the price is consistently below 1.0 and within a specified deviation range.
As we mentioned above, the first supported IPA, the Curve Pool IPA. This IPA dynamically deposits or withdraws gigaAssets to stabilize the peg, with actions governed by protocol-defined conditions.
We will consider bootstrapping the DeFi ecosystem on top of our appchain with sophisticated applications leveraging liquidity in gigaAssets.
This multi-layered architecture ensures that Enjoyoors Orchestrator Appchain remains scalable, secure, and optimized for interoperability.




Enjoyoors operates with epochs, a foundational feature for its protocol operations. An epoch is a specific time frame during which the protocol state remains constant under normal conditions. Throughout an epoch, key protocol parameters remain static as defined at the beginning of the epoch, while gigaAssets remain allocated to target protocols based on the initial distribution (unless urgent circumstances arise, such as immediate liquidity rebalancing or user withdrawals).
The duration of an epoch is a parameter determined by Governance. A seven-day period is currently considered the most reasonable, although this can be adjusted through governance voting.
Before the start of a new epoch, the protocol reassesses its key parameters. The risk management framework recalculates gigaCDP parameters, while DAO input and factual yield assessments are used to review the list of target DeFi protocols and their corresponding allocation weights.
Epochs also impact deposits and withdrawals. Deposits begin accruing yield starting from the epoch following the one in which the deposit was made. Similarly, withdrawals can only be claimed at the end of the epoch following the one in which the withdrawal request was submitted.
Epochs are a foundational feature of the Enjoyoors protocol. An epoch is a specific time frame during which the protocol state remains constant in normal conditions. During one epoch, key protocol parameters remain static as they were defined before the beginning of the epoch. At the same time, gigaAssets sit in target protocols according to the initial distribution (unless some urgency occurs—immediate liquidity rebalancing, user withdrawals, etc.).
Epoch duration is also a parameter defined by governance. The most reasonable period for the epoch seems to be seven days, though it can be amended through governance voting in the future.
Before the next epoch starts, the protocol revisits its key parameters: the risk management framework helps recalculate Giga CDP parameters; DAO and factual yield assessment help revisit the list of onboarded target DeFi protocols; DeFi protocols from the list obtain weights to receive gigaAsset distribution accordingly, etc.
Epochs directly impact deposits and withdrawals, too. Deposits start accruing yield from the beginning of the epoch, followed by the one when the deposit was made. Similarly, withdrawals can be claimed at the end of the epoch, followed by the epoch when requested.
This paper gives a comprehensive overview of the Enjoyoors protocol, including its architecture design and key details of its implementation. Enjoyoors establishes a foundational infrastructure that liberalizes access to liquidity for a wide range of DeFi players. With this important mission in mind, we would like to conclude by sharing some aspects of our strategic vision for the protocol’s potential development pathways.
As the protocol deploys gigaAssets to various DeFi verticals and protocols, the resulting yield originates in various tokens or even points. Managing this dispersion of assets would be highly inconvenient for Enjoyoors users, so reward auctions are designed to streamline the process and enhance the user experience.
In a nutshell, reward actions are smart contracts deployed on supported blockchains that periodically auction off accumulated rewards for gigaAssets on behalf of the orchestrator. Auctions offer tokens and points to participants who bid to acquire them at a fair price nominated in gigaAssets. If points are non-transferable, auction participants should wait until the protocol claims token rewards in exchange for points distributed to them afterward.
Here is a diagram that illustrates the flow of reward auctions:
The Target Protocol generates rewards and sends them to the Rewards Treasury.
The Rewards Treasury emits the corresponding event.
The Relayer reads the event from Rewards Treasury.
The Relayer reaches a consensus.
The Relayer broadcasts signed transactions to the Auction.
The Participant starts an auction.
The Participant makes a bid for open lots.
The Auction chooses the auction winner.
The Participant receives a reward voucher for winning the auction.
The Auction issues a reward voucher for the winner (Participant).
The Auction sends a portion (determined by Governance) of gigaAssets to the Insurance Pool.
The Auction sends gigaAssets to gigaCDP. These funds are distributed to the depositors as rewards for their participation.
The Winner (Participant) redeems rewards using a reward voucher from Treasury.
This section covers the AVS Relayer system — a combination of individual relayers running in a secure environment facilitated by a prominent restaking protocol of our choice.
The Enjoyoors Management System is a decentralized decision-making platform implemented as the proprietary L3 Appchain.
Running on top of the Orchestrator AppChain, the Enjoyoors Management System will be governed by the Enjoyoors native token. The token facilitates decisions regarding gigaAssets liquidity deployments to target protocols, configuring core system parameters and stakes for stability, and maintaining system security.
The system’s foundation lies in its open-source nature, which enhances transparency and security while enabling iterative improvements. This openness encourages active participation from the developer community, facilitating problem resolution, system enhancements, and fostering trust in its operations.
The Enjoyoors Management System is integrated with a wide range of blockchains through AVS Relayers, including major EVM-compatible networks and popular L1s. Leveraging its proprietary interchain communication protocol, Enjoyoors ensures secure and trustless data. This seamless interaction with oracle systems and external users enables the protocol to operate efficiently across diverse ecosystems.
Target Protocol Adapters are smart contracts that act as dedicated adapters for managing liquidity within specific protocols. These adapters receive commands from the gigaAsset Manager to allocate gigaAssets to their respective target protocols and serve as the execution layer for liquidity operations. When liquidity needs to be rebalanced or redirected, the adapters facilitate the withdrawal of gigaAssets.
Adapters also periodically claim rewards earned from target protocols and transfer them to the Rewards Treasury.
The gigaAsset Manager is a smart contract responsible for managing the circulating supply of gigaAssets. It receives commands from the Portfolio Management System via a cross-chain relayer, directing liquidity to target protocols. Additionally, it allocates a portion of the liquidity to the Intelligent Peg Adapter (IPA) for deposits into AMM pools.
The Portfolio Management System periodically assesses and decides on the rebalancing of liquidity across various protocols. It sends corresponding commands to the gigaAsset Manager, which withdraws gigaAssets from specific protocols and reallocates them to others. The system also ensures that the circulating supply of gigaAssets maintains both per-asset and system-wide LTV (Loan-to-Value) levels within predetermined ranges.
The gigaAsset Manager plays a crucial role in maintaining the peg of gigaAssets. To keep the gigaAsset aligned with its target value, it interacts with the Intelligent Peg Adapter. If the price of a gigaAsset deviates from the target value, the gigaAsset Manager can either mint additional gigaAssets for AMM pool or withdraw them from the pool.
The gigaAsset Manager does not make decisions independently; it strictly executes commands from the Portfolio Management System.
Main Operations of the gigaAsset Manager:
Mint gigaAssets
Burn gigaAssets
Stake liquidity in target protocols
Unstake liquidity from target protocols
The Vault is a non-upgradeable smart contract deployed across various blockchain networks, enabling stakers to deposit tokens from a predefined list of approved assets.
Deposit details, including staker accounts and token data, are relayed to the gigaCDP through the cross-chain relayer. The gigaCDP then utilizes the deposits as collateral to determine the amount of gigaAssets that can be minted. It aggregates user deposits, building a pool of liquidity (in gigaAssets) that the protocol can allocate across various target protocols to earn rewards. As an incentive, the rewards are distributed to stakers in gigaAssets, encouraging participation and liquidity provision.
Main Vault Operations:
Deposit The Vault provides a single entry point for Enjoyoors users, allowing them to deposit whitelisted assets.
Withdrawal Users submit withdrawal requests during the current but perform actual withdrawals at the start of the next , after the protocol has completed all necessary rebalancing.
Claim The evaluates stakers' positions to determine whether a withdrawal request is possible. If so, it generates a voucher that stakers can use to redeem their tokens on supported blockchains.
Interchain communication enables the orchestrator appchain to interact with Enjoyoors' blockchain infrastructure in a trustless, secure, and dynamic manner. At launch, Enjoyoors will support:
Ethereum and top 10 L2s: Arbitrum, Base, Polygon, Optimism, Linea, and others.
High-TVL chains: Solana, Aptos, Sui, Sei, TON.
Other L1 chains: Near, Cosmos, Stellar, Cardano, Polkadot
As the protocol matures, more networks and assets will be added. To handle diverse interchain communication, Enjoyoors has developed its own interchain communication protocol that is extensible to a full-scale cross-chain lending and borrowing facility.
The protocol uses specialized messages for token transfers and attestations, ensuring accurate execution on destination chains. Relayers facilitate this process.
Relayers are intermediary services observing blockchain events and securely transporting data to/from the orchestrator appchain. Implemented as restaking Actively Validated Services (AVS), relayers:
Monitor vault interactions and blockchain events.
Capture events, form messages, co-sign them using MPC, and send them to the orchestrator appchain.
Use their private key shares via an MPC scheme to trigger specific smart contract methods:
Minting/Burning synthetics for system stability.
This architecture ensures secure, efficient interchain operations for Enjoyoors.
The AMM pool is a smart contract within an existing external exchange liquidity pool, enabling users to exchange gigaAssets for other assets. Each pool is specifically deployed for a gigaAsset and the corresponding asset to which the gigaAsset's price is pegged (e.g., gigaETH/ETH). AMM pools provide liquidity and help maintain the stability of gigaAssets, ensuring users have access to efficient trading.
The majority of the pool's liquidity is supplied through the Intelligent Peg Adapter (IPA) smart contract, which maintains a reserve of minted gigaAssets that can be deposited into the pool when an equivalent amount of the quote token is provided.
The deployment of AMM pools across different blockchain networks will be determined by the protocol's Governance. At the product launch, the first pool will be a Curve Pool for gigaETH, paired with ETH and/or one of its highly liquid representations (LRT or LST). As the protocol evolves and supports more synthetic assets, additional pools will be deployed.
Considering the protocol's ultimate omni-chain nature, the most pertinent question about its architecture is the extent of its decentralization. How non-custodial and permissionless it truly is, and whether users should be concerned about the safety of their funds. Given a greenfield opportunity to design Enjoyoors, we chose to develop an architecture that addresses potential concerns such as these, ensuring the protocol is both fairly decentralized and effective.
With this intention, we restricted client-facing vaults to only accepting funds and releasing them back to depositors, prohibiting transfers to third-party addresses or any bridging functionality. Additionally, we limited the permissions of protocol components that orchestrate vault operations and outlined a roadmap for fully decentralizing orchestration. Have a look at a high-level overview of the eventual protocol architecture:
Now, we would like to consider each component separately and expand on their functionality.
The Orchestrator AppChain is our proprietary L3 sidechain running on top of a prominent and known SDK with the primary purpose of hosting the decentralized Enjoyoors Management System.
Launching the L3 sidechain is an essential milestone toward the complete decentralization of orchestrating Enjoyoors vault. The Appchain will hold the actual state of important static and dynamic protocol parameters, while further actions (rebalancing, commands to vaults, etc.) will also be transparently reflected on the sidechain.
The AppChain can accept future deployments of third-party smart contracts, opening up a promising opportunity to create a full-scale DeFi ecosystem based on the Enjoyoors Orchestrator AppChain. With its extraordinary TVL potential, Enjoyoors can offer liquidity support on demand and become a home for highly liquid DeFi products.
Advantages of running own L3:
1. Saving on fees – many transactions will be free - L3 solutions significantly reduce transaction costs, as most operations are executed off the main chain and then aggregated for confirmation on L2 or L1. - In some cases, transactions can be entirely free due to subsidization or other fee-covering mechanisms.
2. Low-cost transactions – crucial for auctions - High gas costs make auctions (e.g., NFT sales or MEV strategies) less accessible to users. L3 solves this problem by offering near-zero fees. - L3 can implement specialized transaction pricing models, such as fixed minimal fees or payments in ecosystem tokens.
Relayers serve as a transport layer between and various supported blockchain networks. Their primary function is to monitor events occurring across connected networks and securely transmit information cross-chain. Message recipients (smart contracts on supported blockchain networks and modules) process the messages and make decisions based on the message payload.
To ensure the security of all transmitted messages, Relayers sign each message using their cryptographic keys, guaranteeing the authenticity and reliability of the data.
Relayers leverage restaking infrastructure and are deployed as an Actively Validated Service (AVS ) to enhance security and operational consistency.
By acting as a secure and efficient bridge, Relayers ensure seamless communication between the and supported blockchain networks. Relayers transmit information related to the following operations within the Enjoyoors protocol:
Intelligent Peg Adapters (IPAs) are specialized smart contracts designed to maintain the stability of the peg. Each IPA serves as a dedicated adapter to seamlessly communicate with the corresponding approved by Governance.
The pre-allocates a supply of by minting them directly to the IPA. When quote token liquidity is provided by liquidity providers, the IPA combines it with its available to deposit both tokens into the at a one-to-one ratio. This ensures the pool remains balanced and supports efficient trading between the tokens.
The IPA employs a combined mechanism to maintain peg stability during price deviations from the target range:
If sufficient liquidity is available in the contract, it can perform token swaps to adjust the peg. This mechanism directly impacts the token reserve amounts in the pool, bringing the peg back to the target range.
The Governance module operates as a DAO, serving as the protocol's decision-making authority, where holders of governance tokens actively participate in managing the protocol and ensuring its security through transparent and democratic processes. To participate in voting and governance of the protocol, token holders must stake their tokens in the .
At its core, this module is responsible for defining parameters that maintain the protocol's stability and efficiency. Its responsibilities include:
Determining which tokens to accept and in which blockchain networks.
Setting parameters related to .
Staking/Unstaking synthetics to manage supply and earn yield.
Combining actions, e.g., unstake + burn or mint + stake.
Asset withdrawals from Vaults.
Inclusion of new assets into Vaults.
Rewards auctions.
Slashing events from Target Protocols.
Slashed debt auctions.
gigaAsset supply changes and risk management.
Portfolio rebalancing in Target Protocols.

When deposit/withdraw functionality is not paused, the IPA can facilitate the provision or withdrawal of gigaAssets. This mechanism increases or decreases the reserve amount of gigaAssets, helping to stabilize the peg.
In addition to the IPA's stabilization mechanisms, authorized liquidity providers and AMMs actively monitor the peg. These entities use the IPA to dynamically rebalance the peg. Their involvement provides an additional layer of stability, ensuring the peg is maintained even during volatile market conditions.
The first IPA that the Enjoyoors protocol will support is the Curve Pool IPA.

Selecting target protocols for liquidity allocation.
Determining allocation weights for directing liquidity between target protocols and AMM pools.
Making decisions regarding the minting and burning of gigaAssets in cases not covered by the automated services of the Portfolio MS.
Approving strategies for redistributing and rebalancing liquidity.
Establishing the protocol's risk parameters.
Managing decisions on the distribution of funds from the Insurance pool.
These decisions are made collectively by the ENJ MS token holders, ensuring the protocol remains adaptive and secure.




Claim rewards from target protocols
Deposit liquidity into the IPA
Withdraw liquidity from the IPA



3. High transaction speed without competition - L3 allows for transaction prioritization mechanisms, eliminating the need for competition for block space, as seen in L1 and even L2. - Technical transactions (such as liquidations, rebalancing, and arbitrage trades) can be prioritized, which is critical for DeFi.
4. Customizability – tailored execution environments - L3 networks offer greater flexibility, allowing developers to customize execution environments, fee structures, and consensus mechanisms. - This makes it possible to optimize network performance for specific use cases such as The Orchestrator Appchain.
Affects: Сritical LTV
Enjoyoors needs a robust measure to identify collateral portfolio constituents' losses in the worst-case scenario. Enjoyoors uses statistical bootstrap to gauge the volatility risk and to calculate critical LTV levels (discounts):
Generate return distribution of the collateral asset in question.
Approximate distribution parameters (mean, variance, skewness, jumps, etc.)
Simulate N return paths using estimated parameters.
Calculate expected tail loss: take an average worst 1% return from all simulations.
Use this value scaled with the relevant period to calculate critical LTV levels and confidence bands.
Affects: relative collateral portfolio weights and supply limits
Deciding what assets to accept as collateral is a portfolio allocation and a portfolio optimization problem. If Enjoyoors protocol manages to collect and maintain a well-diversified portfolio of collateral assets that will yield the desired risk/return characteristics.
Correlation helps identify the right collateral portfolio weights. Unfortunately, calculating and predicting correlations is hard. There is also plenty of academic evidence that the naive equal weighting is pretty hard to beat. We’re also faced with limited or absent data for correlations calculation. Despite all the pitfalls described above, it’s always good to know how well-diversified your portfolio is. To gauge this, Enjoyoors calculates a portfolio diversification multiplier and sets an objective to maximize it.
Consider a simple example of two asset portfolios where the assets are perfectly correlated and have the same annualized volatility of 100%. The portfolio volatility will be the same as the volatility of its constituents: 100%, and there is no diversification benefit; the multiplier is 1.
If the correlation between two assets falls to 0.5, the resultant portfolio volatility will be 86.6%, and the diversification multiplier will be 100% / 86.6% ~ 1.15. Reducing correlations even further to 0.0 yields portfolio volatility of 7.07% and a multiplier of 1.41.
You get the idea: the more the collateral portfolio is diversified, the less risk (volatility) it has. The diversification multiplier is then calculated concerning the volatility target (which, in the case of Enjoyoors, is the volatility of the underlying synthetic).
Affects: critical LTV, collateral supply limits.
Liquidity risk is pretty straightforward to understand: The less liquidity there is on the venues where the collateral asset is traded, the higher the price impact will be when Enjoyoors manage asset positions (for example, when rebalancing a portfolio, or liquidating part of the position to meet LTV thresholds). To gauge the market liquidity, Enjoyoors has developed an in-house scoring system that calculates the real-time liquidity score of an asset, taking into account the following factors:
TVL: Combined liquidity (TVL) on all available AMMs and DEX-es where the asset is traded.
CEX presence: Presence or absence of liquidity on centralized exchanges.
Liquidity depth: 2%, 5%, 10% depth on both DEXes and CEX-es
Locked liquidity share: how much liquidity on DEX-es is locked due to LP staking.
Liquidity profile: any potential skew or poor liquidity on the bid side should be considered when calculating the final liquidity score.
All assets are ranked based on the above metrics and are then assigned a final score between 0 and 100. 0 is no liquidity or worst liquidity conditions, while 100 roughly corresponds to an ability to immediately realize $1M of the asset with less than 2% market impact.
Affects: relative collateral portfolio weights and supply limits
This risk is closely tied to Liquidity risk, and broadly speaking, it gauges what the supply limits on all of the collateral assets supported by the Enjoyoors protocol should be. On a very basic level, it doesn’t make sense to configure Enjoyoors pools to allow for 1B of collateral assets in asset A if aggregate combined liquidity on all AMMs in asset A is 500M. Instead, the supply limit should be a fraction of the 500M, not the out-of-touch 1B assets.
Affects: collateral asset market volatility and the critical LTV (indirectly).
Enjoyoors uses public and proprietary information sources about each company behind each collateral asset to assess its intangible quality. Again, we built a proprietary ranking model that helps us compare different assets using hardly quantifiable metrics. Here are some of the factors we consider, among others, when building our qualitative risk-scoring model:
Investor list, round information, valuations.
Asset holdings distribution - number of holders and strong hands.
Social media score (like X score, number of influential and KOL followers, etc.)
Centrality scores and connection rankings.
Average engagement rates on social media.
Sentiment analysis and discord activity.
Competition and SWOT analysis, similarity score in relation to competitors.
Legal and regulatory compliance and obstacles.
Other risks of the Enjoyoors protocol may be broken down to the following:
Technology risk: refers to the potential for financial or operational loss due to flaws, vulnerabilities, or malicious actions within any part of the Enjoyoor’s technology (smart-contracts, appchain, relayers). To mitigate these risks Enjoyoors will perform multiple audits of its core tech, as well as integrate with real time threat monitoring services which will be able to pause Enjoyoors’ vaults in case of malicious actions.
Oracle and price manipulation risk: Inconsistent or corrupt pricing information could lead to unintended synthetic supply shock or the insolvency of certain markets. Enjoyoors integrates 2 oracle providers: PYTH and Chainlink, as well as organizes direct market feeds from a number of CEXes and DEXes. All of these price feeds are then medianized and monitored real time for outlier price detection. The failure of any single one and even several of them simultaneously will not materially affect the Enjoyoors protocol.
Synthetic supply shock risk: Big chunk of gigaAsset supply entering the market in a short period of time could affect its peg. This could happen due to a major slashing event, liquidation of the whale position on the lending protocol, or just because a malicious actor decided to attack the stability of Enjoyoors’ gigaAsset. Since Enjoyoors protocol controls gigaAssets’ circulating supply - it can decide how and on what terms to bootstrap the Сurve pool (making sure that substantial synths supply chunk in the pool is controlled by the IPA). Additionally, Enjoyoors governance can limit liquidity exposure to certain protocols to cap the amount of potential gigaAsset circulating supply entering the market.
Decimals: 18
Token Address: 0x8589a0dD9eCD77B7D70Ff76147dcE366bF31254E
Ambient
gigaETH/wWETH
LFJ
gigaETH/wWETH
LFJ
MON/gigaETH
OctoSwap
gigaETH/wWETH
Enjoyoors takes your privacy very seriously. Please read the following to learn more about Enjoyoors' Privacy Policy (“Policy“). This Policy details how Enjoyoors receives, collects, and uses information in connection with your visits to (and all associated resources, subdomains or otherwise related web pages (the “Website“).).
When using our site, you may be asked to enter your name, email address, or other details to help you with your experience.
These terms and conditions (the “Terms”) apply to the Enjoyoors protocol and software (the “Protocol”), the tools available at and all associated resources, subdomains or otherwise related web pages (collectively, the “Website”) which include texts, images, audio, code, and other materials (collectively, the “Content”) and all of the features and services provided therein. The Protocol is the decentralized application built on public L1/L2. The Website, the Protocol, and any other features, tools, materials, or services offered from time to time are referred to here as the “Services.” Please read these Terms carefully before using the Protocol. By using or otherwise accessing the Protocol, or by clicking to accept or agree to these Terms where that option is made available, you (1) accept and agree to these Terms and (2) you accept and agree to any additional terms, rules, and conditions of participation that may be issued, made available on the Website or notified to you from time to time. If you do not agree with the Terms, then you may not access or use the Content or Protocol.
Deposit process step-by-step:
External user deposits supported assets into the via .
The emits corresponding event.
The reads the emitted event from .
To provide you with our services, we need to collect some personal data, and are sometimes obliged to do so under law.
To provide you with our services, we need to collect some personal data, and are sometimes obliged to do so under law.
We collect information from you when you subscribe to a newsletter, fill out a form, or enter information on our site.
We may use information we collect from you when you register, sign up for our newsletter, respond to a survey or marketing communication, browse the website, or use certain site features in the following ways:
To send periodic emails with news and Enjoyoors platform updates
To follow up with users after correspondence (live chat, email, or phone inquiries)
We will retain your information for as long as your account is active, your information is needed to provide you services, or as long as we are required to fulfill our legal obligations. By contacting us at [email protected], you can at any time obtain confirmation of whether or not your personal data is being processed.
We only provide information. Your personal information is contained behind secured networks accessible only by a limited number of people who have special access rights. They are furthermore required to keep this information confidential. In addition, any sensitive information or credit card numbers you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user enters, submits, or accesses their information to maintain your information safely.
All the information we collect on you will always belong to you. But we are a collector and a processor of your information. That implies certain obligations to respect your rights to such information and facilitate the exercise of your rights in respect to the information. In order to use any of your rights at any time, please contact us and we will facilitate the exercising of your rights free of charge.
Yes. Cookies are small files that a site or its service provider transfers to your computer's hard drive through your web browser (if you allow it), enabling the site's or service provider's systems to recognize your browser, capture, and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They also help us understand your preferences based on previous or current site activity, which lets us provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction, so that we can offer better site experiences and tools in the future.
We use cookies to:
Understand and save a user's preferences for future visits.
Keep track of advertisements.
Compile aggregate data about site traffic and site interactions to offer better site experiences and tools in the future. We may also use trusted third-party services that track this information on our behalf.
You can choose to have your computer warn you each time a cookie is sent, or you can choose to turn off all cookies. You do this through your browser settings. Since every browser is a little different, look through your browser's Help Menu to learn the correct way to modify your cookie settings. If you turn cookies off, some of the features that make your site experience more efficient may not function properly.
We do not sell, trade, or otherwise transfer your personally identifiable information to outside parties unless we provide users with advance notice. This does not include website hosting partners and other parties who assist us in operating our website, conducting our business, or serving our users, so long as those parties agree to keep this information confidential. We may also release information when appropriate in order to comply with the law, enforce our site policies, or protect our rights, property, or safety, or those of others.
But non-personally identifiable visitor information may be provided to other parties for marketing, advertising, or other uses.
Google's advertising requirements can be summed up by its advertising principles, which provide a positive experience for users. (https://support.google.com/adwordspolicy/ answer/1316548?hl=en)
We use Google products on our website.
Google, as a third-party vendor, uses cookies to serve ads on our site. Google's use of the DART cookie enables it to serve ads to our users based on previous visits to our site and other sites on the internet. Users may opt out of using the DART cookie by visiting the Google Ad and Content Network privacy policy.
We have implemented the following:
Google Display Network Impression Reporting
Demographics and Interests Reporting
DoubleClick Platform Integration
Along with third-party vendors such as Google, we use first-party cookies (such as the Google Analytics cookies) and third-party cookies (such as the DoubleClick cookie) or other third-party identifiers together to compile data regarding user interactions with ad impressions and other ad service functions as they relate to our website.
Users can set preferences for how Google advertises to you by using the Google Ad Settings page. Alternatively, you can opt out by visiting the Network Advertising Initiative Opt Out page, or by using the Google Analytics Opt Out Browser add-on.
Enjoyoors has discretion to update this Policy at any time, so you should periodically check this Policy. Your continued use of the service after we post any modifications to the Policy on this page will constitute your acknowledgment of the modifications, as well as your consent to abide and be bound by the modified Policy. You acknowledge and agree that it is your responsibility to review this Policy for modifications.
If you have any questions about this Policy, wish to exercise any of your rights to personal data and information, or file a complaint, please contact us at [email protected].
The information provided by Enjoyoors (“we,” “us,” or “our” on the “Website”) is for general informational purposes only. All information on the Site is provided in good faith, however we make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability, or completeness of any information on the Site. Under no circumstance shall we have any liability to you for any loss or damage of any kind incurred as a result of the use of the site or reliance on any information provided by the site. your use of the site and your reliance on any information on the site is solely at your own risk.
The Site cannot and does not contain legal advice. The legal information is provided for general informational and educational purposes only, and is not a substitute for professional advice. Before taking any actions based upon such information, we encourage you to consult with the appropriate professionals. We do not provide any kind of legal advice. THE USE OR RELIANCE OF ANY INFORMATION CONTAINED ON THIS SITE IS SOLELY AT YOUR OWN RISK.
The Site may contain testimonials from users of our products or services. These testimonials reflect the real-life experiences and opinions of such users. However, the experiences are personal to those particular users, and may not necessarily be representative of how other users feel about our products or services. We do not claim, and you should not assume, that all users will have the same experiences. Your individual results may vary.
The testimonials on the Site are submitted in various forms such as text, audio, and video, and are reviewed by us before being posted. They appear on the Site verbatim as given by the users, except for the correction of grammar or typing errors. Some testimonials may have been shortened for the sake of brevity where the full testimonial contained extraneous information not relevant to the general public.
The views and opinions contained in the testimonials belong solely to the individual user and do not reflect our own views or opinions. We are not affiliated with users who provide testimonials, and users are not paid or otherwise compensated for their testimonials.
These Terms may be amended, changed, or updated at any time, without prior notice to you. It is your obligation to continually review the Website to ensure that you fully understand these Terms (as well as ensuring that you maintain an accurate copy of the Terms). Your continued use of any Service, Content, or Protocol after the effective date of any amendments, changes, or updates constitutes your full acceptance of these Terms, as modified by such amendments, changes, or updates. If you do not agree with the Terms in effect when you access or use the Service, you must stop using the Service immediately.
If you agree to comply with these Terms, you are granted the limited right to use the Website, the Protocol, and the Service. This right is a personal, restricted, non-exclusive, non-transferable, non-sublicensable, revocable, limited license, and it is subject to the limitations and obligations outlined in these Terms. Nothing in these Terms gives you any license (other than as set out in this paragraph), right, title, or ownership of, in, or to the Website, any of the Services, the Content, or the Protocol. The Website may suspend or terminate its Services for you, your digital token wallet, or any of your digital token addresses at its sole absolute discretion, as may be required by applicable laws, or where it is determined that you have violated, breached, or acted inconsistently with any of these Terms.
Your use of the Protocol, its content, and any associated Services is at your own risk. The Protocol, its content, and any associated Services or items obtained through the Protocol are provided on an “as is” and “as available” basis, without any warranties of any kind, either express or implied. All persons, entities, agents, and members involved with the creation of the Protocol (collectively “Members”) make no warranty or representation with respect to the completeness, security, reliability, quality, accuracy, or availability of the Protocol and Service. Without limiting the foregoing, no Member represents or warrants that the Protocol, Service or items obtained through the Protocol will be accurate, reliable, error-free, or uninterrupted, that defects will be corrected, that the items obtained through the Protocol will meet your needs or expectations. Members hereby disclaim all warranties of any kind, whether express or implied, statutory, or otherwise, including but not limited to any warranties of merchantability, non-infringement, and fitness for a particular purpose. The foregoing does not affect any warranties which cannot be excluded or limited under applicable law.
o the fullest extent permitted by law and notwithstanding any other provision of these Terms or applicable provisions of law, any and all fiduciary duties the Members or any related entities and agents may have to the user, its affiliates, or the end users of the Service, the Website or its content shall be eliminated, provided that such exclusion or limitation of liability shall not extend to misappropriation of assets or funds of the users, its affiliates, or the end users of the Services, Website or content provided by the Members or any related entities and agents or other acts or omissions that constitute a bad faith violation of the implied contractual covenant of good faith and fair dealing.
You acknowledge the following risks related to your use of the Website, the Protocol, and its Services:
6.1 Legislative and regulatory changes or actions may adversely affect the use, transfer, exchange, and value of crypto-assets.
6.2 The underlying blockchains (including Monad, Ethereum, Solana, TON, and others supported by Enjoyoors) may experience delays, changes to the network, failure, or a critical issue in the protocol. The Protocol and its Members do not own or control these blockchains and are not responsible for their operation, therefore they make no guarantees or representations regarding the networks’ security, functionality, or availability.
6.3 Enjoyoors’ native assets, including but not limited to the Enjoyoors token (NJOY), gigaAssets (such as gigaETH and gigaBTC), and any other cryptographic assets (the “Crypto-Assets”) that are supported on the Protocol, are compatible with multiple blockchain networks. The Crypto-Assets may also be compatible with software or other technology provided by a third-party. Where the Crypto-Assets trade or are available on third-party exchanges, the Protocol and its Members do not guarantee the security or functionality of any third-party software and/or exchanges and are not responsible for any losses of or related to the Crypto-Assets due to the failure of third-party software or technology.
6.4 Transactions in the Crypto-Assets may be irreversible, and accordingly, losses due to fraudulent or accidental transactions may be unrecoverable.
6.5 The value of Crypto-Assets may be derived from the continued willingness of market participants to exchange fiat currency for these assets, which may result in permanent and total loss of value of a particular crypto-asset should its market disappear.
6.6 The volatility and unpredictability of the price of crypto-assets relative to fiat currency may result in significant loss over a short period of time.
6.7 The Crypto-Assets may be subject to an increased risk of fraud or cyberattack.
6.8 The Terms do not disclose all of the risks associated with using the Crypto-Assets, the Website, the Protocol, and the Services. You acknowledge and agree that you are solely responsible for determining the nature, potential value, and suitability of those risks for you in light of your own circumstances and financial resources.
The Protocol and its Members will not, under any circumstances, give tax advice, legal advice, or other professional advice in the course of your use of the Website, the Protocol, and the Services. No materials on our Website, including FAQs or blogs, shall be considered tax advice, legal advice, or investment advice.
You further acknowledge and agree that you shall access and use the Crypto-Assets, the Website, the Protocol and the Services at your own risk.
You agree to indemnify, defend, and hold harmless the Members and any related entities, as well as the officers, directors, employees, shareholders and representatives of the Protocol, from and against any and all losses, liabilities, expenses, damages, costs (including attorneys' fees, fees or penalties imposed by any regulatory authority and court costs), claims, or actions of any kind whatsoever arising or resulting from your use of the Crypto-Assets, the Website, the Protocol, and the Services, your violation of these Terms, your violation of any law, rule, or regulation, or the rights of any third party, and any of your acts or omissions that implicate publicity rights, defamation or invasion of privacy.
You expressly acknowledge and agree that you assume full responsibility for your use of the Website, the Protocol, and the Services. You expressly acknowledge and agree that any information you send or receive during your use of the Website, the Protocol, and the Services may not be secure and may be intercepted or later acquired by unauthorized parties. You acknowledge and agree that you shall access and use the Crypto-Assets, the Website, the Protocol and the Services at your own risk. To the fullest extent permitted by applicable law, neither the Members nor any related entities, suppliers or licensors will be liable to you for any direct, indirect, incidental, special, consequential, punitive, exemplary or other damages of any kind, including without limitation damages for loss of profits, goodwill, use, data or other tangible or intangible losses or any other damages based on contract, tort, strict liability (even if any of the Members or related entities had been advised of the possibility of such damages); the use or the inability to use the Website or Service; unauthorized access to or alteration of your data; statements or conduct of any third party on the Website or Service; human errors; technical malfunctions; failures, including public utility or telephone outages; omissions, interruptions, latency, deletions or defects of any device or network, providers, or software (including, but not limited to, those that do not permit participation in the Services); any injury or damage to computer equipment; inability to access the Crypto-Assets, the Website, the Protocol and the Services; theft, tampering, destruction, or unauthorized access to, images or other content of any kind; data that is processed late or incorrectly or is incomplete or lost; typographical, printing or other errors, or any combination thereof; or any other matter relating to the Crypto-Assets, the Website, the Protocol and the Services. Where a jurisdiction does not allow the exclusion of certain warranties or the limitation or exclusion of liability for incidental or consequential damages, some of the above limitations may not apply to you. If you are dissatisfied with any of the Services or with this agreement, your sole and exclusive remedy is to discontinue use of the Services. The Crypto-Assets, the Website, the Protocol, and the Services are provided “as is” and without any representation or warranty, whether express, implied or statutory. The Members, their affiliates, respective officers, directors, agents, joint venturers, employees, and suppliers specifically disclaim any implied warranties of title, merchantability, fitness for a particular purpose or non-infringement.
We grant you a limited, non-exclusive, non-sublicensable, and non-transferable license to access and use Enjoyoors’ native assets (the “Native Assets”), including but not limited to the Enjoyoors token(NJOY) and gigaAssets (such as gigaETH and gigaBTC), the Website, the Protocol, and the Services. All title, ownership, and intellectual property rights in the Native Assets, the Website, the Protocol, and the Services are owned by the Members, related entities, or their licensors. You acknowledge and agree that the Services contain proprietary and confidential information that is protected by applicable laws, including intellectual property laws. You agree not to copy, modify, rent, lease, loan, sell, distribute, perform, display, or create derivative works based on the Services, in whole or in part.
The Protocol, on a best endeavours basis, attempts to provide accurate and reliable information and content on the Website, but such information may not always be correct, complete, or up-to-date. We will update the information on the Website as necessary to provide you with the most up-to-date information, but you should always verify this information’s actuality. The Website may also contain links to third-party websites, applications, events, or other materials (“Third Party Content”). Such information is provided for your convenience and links or references to Third Party Content do not constitute a recommendation of any products or services. The Members and any related entities shall have no liability for any losses incurred as a result of actions taken in reliance on the information contained on the Website or in any Third Party Content.
We may terminate or suspend access to Services in whole or in part immediately and without prior notice or liability should you breach any of your obligations under the Terms or in our absolute discretion. Upon termination of your access, your right to use the Crypto-Assets, the Website, the Protocol, and the Services is forfeited immediately. The following provisions of the Terms survive any termination of these Terms: Indemnity; disclaimer of warranty; limitation on liability; intellectual property rights; third-party content; termination and suspension; no third-party beneficiaries; binding arbitration and class action waiver; general information.
You agree that, except as otherwise expressly provided in these Terms, there shall be no third-party beneficiaries to the Terms.
You may not use the Crypto-Assets, the Website, the Protocol, or the Services to engage in the following categories of activity (“Prohibited Uses”):
In any way that violates any applicable federal, state, local, or international law or regulation (including, without limitation, any laws regarding the export of data or software to and from the US, EU, or any other country).
For the purpose of exploiting, harming, or attempting to exploit or harm minors in any way by exposing them to inappropriate content, asking for personally identifiable information, or otherwise.
To transmit any advertising or promotional material, including any “junk mail,” “chain letters,” “spam,” or any other related solicitation.
To impersonate or attempt to impersonate the Protocol, the Member, another user, or any other person or entity.
In any way that infringes upon the rights of others, or in any way is illegal, threatening, fraudulent, or harmful, or in connection with any unlawful, illegal, fraudulent, or harmful purpose or activity.
To engage in any other conduct that restricts or inhibits anyone’s use of the Crypto-Assets, the Website, the Protocol, and the Services, or which, as determined by us, may harm or offend the Protocol or users of the Protocol or expose them to liability.
In order to disguise the proceeds of (or to further) any breach of applicable laws or regulations, or to deal in the Crypto-Assets or other digital assets, funds, which may be the proceeds of illicit activity.
To interfere with or subvert our rights or obligations, or the rights or obligations of any other user or any other third party.
To engage in conduct that is detrimental to us or to any other user or any other third-party.
To falsify or materially omit any information, or provide misleading information we request in the course of, directly or indirectly relating to, or arising from your activities when using the Crypto-Assets, the Website, the Protocol, and the Services.
To reverse-engineer, decompile, or disassemble any software running on the Protocol, or to attempt to harm us with your access to the Crypto-Assets, the Website, the Protocol, and the Services.
You agree that we will use the e-mail address you have provided us to send you e-mails relating to the management and operation of the Website, the Protocol, and the Services.
These Terms and all non-contractual or other obligations arising out of or in connection with them are governed by the laws of England and Wales.
16.1 These Terms (including regarding the existence, validity or termination of these Terms), all non-contractual obligations arising from or connected with them and the use of the Protocol, the Website and Services shall be governed by and construed in accordance with the laws of England and Wales, excluding its conflict of law rules.
16.2 The parties agree to submit to the exclusive jurisdiction of the courts of England and Wales, provided, however, that we shall have the right, at our sole option, to initiate proceedings against you in any other court of competent jurisdiction.
These Terms (including any information incorporated by reference herein) comprise the entire agreement between you and us covering your use of the Website, the Protocol, and the Services.
If any court or competent authority decides that any provision of these Terms are invalid, unlawful or unenforceable to any extent, such terms shall, to that extent only, be severed from the remaining terms. The remaining terms shall continue to be valid to the fullest extent permitted by law.
The Relayer reaches consensus.
The gigaCDP adds deposited assets to the queue.
The gigaCDP processes the queue in the next epoch and updates collateral amount in the deposited assets.
The gigaCDP aggregates CDPs to calculate actual and target circulating supply of gigaAssets.
The gigaCDP emits a corresponding event.
The PMS decides on gigaAssets liquidity rebalancing based on new portfolio allocation details.
The PMS emits a corresponding event.
The Relayer reaches consensus.
The Relayer signs and transmits a message containing rebalancing details to the gigaAsset Manager.
The gigaAsset Manager mints gigaAssets in accordance with new portfolio allocation details.
The gigaAsset Manager supplies liquidity to the Target Protocols through the Target Protocol Adapters.
The gigaAsset Manager supplies liquidity to the AMM Pools through the Intelligent Peg Adapters.

@startuml
autonumber
actor "External user"
participant Vault
participant Relayer
participant "gigaCDP"
participant PMS
participant "gigaAsset Manager"
participant "Target Protocol"
participant "AMM Pool"
== Epoch 1 ==
"External user" -> Vault: Deposit assets
Vault -> Vault: Emit event
Relayer -> Vault: Listen to events
Relayer -> Relayer: Reach consensus
Relayer -> "gigaCDP": Broadcast signed transaction
"gigaCDP" -> "gigaCDP": Add the deposited assets to the queue
== Epoch 2 ==
"gigaCDP" -> "gigaCDP": Open / update CDP
"gigaCDP" -> "gigaCDP": Calculate actual and target level of gigaAssets
"gigaCDP" -> "gigaCDP": Emit event
PMS -> "gigaCDP": Get actual and target level of gigaAssets
PMS -> PMS: Recalculate portfolio weights
PMS -> PMS: Decide on gigaAssets liquidity rebalancing
PMS -> PMS: Emit event
Relayer -> PMS: Listen to events
Relayer -> Relayer: Reach consensus
Relayer -> "gigaAsset Manager": Broadcast signed transaction
"gigaAsset Manager" -> "gigaAsset Manager": Mint gigaAssets
"gigaAsset Manager" -> "Target Protocol": Supply liquidity
"gigaAsset Manager" -> "AMM Pool": Supply liquidity
@endumlOctoSwap
gigaETH/MON
Enjoyoors is a novel omniasset liquidity primitive. Stake anything, earn yield, and, for DeFi products, tap into a rich source of liquidity.
Enjoyoors unlocks the yield and staking potential of any crypto asset and provides a Liquidity Mainline for DeFi products to tap into a new, powerful source of liquid value from all over Web3.
The protocol introduces a foundational infrastructure that allows any product to succeed in liquidity competition. The Liquidity Mainline nourishes everyone with Enjoyoors liquidity — whether it is a staking protocol, DeFi protocol, or entire blockchain ecosystem.
With Enjoyoors, we aim to eliminate existing liquidity inefficiencies, enabling myriad capital opportunities, including:
Generating yield on any underutilized asset: governance tokens, LP tokens, LRTs, etc.
Linking underserved ecosystems to trending yield and staking opportunities
Sourcing new liquidity for crypto-economic security in restaking protocols
Helping legit protocols bootstrap TVL at scale
Introducing new opportunities for major market makers and AMMs
The protocol will operate the Liquidity Mainline, a trustless decentralized liquidity agent lending its helping hand to any application or protocol competing for TVL. It ensures that the actual value of a diverse crypto portfolio, which users stake in Enjoyoors, is routed to places where it is needed most and earns the most yield. To make this possible, Enjoyoors works as an actively managed Giga CDP that rehypothecates the value of user-deposited assets in the form of gigaAssets. These synthetic assets are softly pegged to well-known cryptocurrencies, such as ETH and BTC, and get deployed to yielding pools and protocols across DeFi.
Enjoyoors aims to deploy gigaAssets to external protocols that pay yield on staking or lending. This approach aligns well with the rising competition for liquidity across the DeFi space. More restaking protocols enable various ERC-20 tokens for staking in their pools besides traditional liquid wrappers of staked ETH or other base currencies. Relevant examples are Symbiotic or Karak here. Even conservative EigenLayer was testing permissionless ERC-20 token support recently (according to )
Enjoyoors aims to maximize potential earnings on top-300 cryptocurrencies by picking protocols with the highest rewards on deployed gigaAssets while neglecting the risk. Indeed, all restaking protocols mentioned above are potential targets as well as other players offering other DeFi services like lending or yield farming. The Enjoyoors protocol transfers a cut of all yield (InsuranceFee) to the Insurance pool. In contrast, the remaining yield lands in Giga CDP and becomes available to users pro rata their stakes in the collateral basket.
Protocol design introduces robust decentralized mechanisms to guarantee the protocol's security and maintain the value of gigaAssets it issues. This document covers the main principles of the protocol architecture and some details of its implementation.
To streamline protocol-level CDP management, Giga CDP is considered a decentralized portfolio. This portfolio comprises collateral in various tokens and liabilities in various gigaAssets, all across multiple blockchains. Collateral weights are positive, while liability weights are negative.
The protocol operates an internal accounting system built on top of this decentralized portfolio, which serves as the foundation for all liquidity management within the Giga CDP. This accounting system breaks the overall portfolio into segregated virtual markets parametrized by the $C-$D pair ($C - collateral asset, $D - synthetic gigaAsset). In simple words, the system links a specific part of the gigaAsset $D supply to a defined fraction of a particular vault containing the collateral asset $C. The diagram below illustrates the relationship between vaults and virtual markets:
Each virtual market is characterized by its market LTV parameter, defined as the ratio of the total gigaAsset $D issued in this market to the total amount of collateral asset $C virtually allocated to it. Other essential parameters that Giga CDP constantly tracks include average system LTV, total collateral, and total synthetic debt.
A combination of these parameters lay in the foundation of the portfolio management system. Its central feature is ensuring the protocol solvency and targeting a certain level for the overall portfolio LTV.
The architecture of the Enjoyoors protocol is designed for the ultimate safety of funds in the protocol vaults and complete transparency in vault orchestration.
LPs (so-called enjoyoors) provide liquidity to the protocol by depositing their crypto assets into deployed across a wide range of blockchain networks. In return, they earn yield nominated in without additional effort from their end.
At the heart of the protocol is the (ENJ MS), a decentralized governance and decision-making system. It manages a decentralized portfolio defined by $C-$D pairs ($C - collateral asset, $D - synthetic ), ensuring accurate tracking and evaluation. Playing a pivotal role in determining the amount of to mint, it also makes decisions on their allocation across various target protocols within a wide range of blockchain networks.
We will run ENJ MS on our proprietary blockchain network (L3) at the later stages of development, enabling complete decentralization of the Enjoyoors protocol. Running the proprietary Enjoyoors network opens up a promising opportunity to build the entire DeFi ecosystem on top of it. We will touch on the technical aspects of this L3 in the .
The is a specialized service deployed as an Actively Validated Service (AVS) on a prominent restaking platform that facilitates seamless communication between the

The Insurance Pool serves as a reserve fund, accumulating resources from the rewards distributed through completed auctions. When an auction concludes and a winner is determined, a portion of the gigaAsset tokens collected from the winning bid is allocated to this pool. These funds are specifically reserved to cover potential losses that may occur during the protocol's operations.
In addition to gigaAssets, governance tokens staked within the protocol may also serve as a reserve fund. These tokens can be used to pay rewards to stakers and address other potential losses, further enhancing the protocol's resilience and sustainability.
gigaCDP is a central module of the , responsible for aggregating and managing user deposits across multiple blockchain networks. It plays a crucial role in determining the amount of to be minted based on the collateral provided by users. This module functions as a DAO-managed portfolio of assets and liabilities, tracking the status of all collateral assets and synthetic obligations while maintaining Loan-to-Value (LTV) ratios to ensure protocol stability.
gigaCDP stores aggregated records of all user deposits within the protocol, regardless of the blockchain network in which they were made. These deposits are treated as collateral and are used to open CDPs (collateralized-debt positions).
The module stores predefined average LTV ratios for tokens supported by the protocol. gigaCDP calculates the maximum amount of gigaAssets that can be minted based on the LTV, ensuring the minted supply is always backed by sufficient collateral.
gigaCDP also facilitates the distribution of rewards earned from . The rewards are auctioned for before being distributed to External users. The obtained from these auctions are then used to reward External users based on their deposits, incentivizing active participation in liquidity provisioning within the protocol.
When External users want to claim their assets, they submit withdrawal requests to
The Rewards Treasury is a smart contract designed to accumulate rewards earned from interactions with . It serves as a vault for managing rewards, ensuring they are securely stored and transparently distributed.
Rewards earned through liquidity provision are claimed and routed to the Rewards Treasury. These rewards may include tokens, points, or other assets provided by Target Protocols as incentives for liquidity participation.
Information about the rewards is relayed to the within the , which facilitates auctions where participants compete for the opportunity to claim the rewards. The winner of an auction receives a voucher specifying the exact amount of rewards they can redeem. This voucher can then be used to claim the rewards stored in the Rewards Treasury.
gigaCDP Main Operations:
Receive Vault Balances: gigaCDP receives and stores information from Vaults about External users positions, including accounts, assets, and amounts.
Fetch Claim Voucher: External users fetch claim vouchers to redeem their tokens.
Claim gigaAsset Rewards: Exteranal users claim rewards earned from Target Protocols.




The Portfolio Management System (Portfolio MS) is a core module responsible for managing the allocation of liquidity across the protocol. By leveraging the actual and target gigaAsset ratios from the gigaCDP, it ensures an up-to-date understanding of the available liquidity. Using this information, Portfolio MS directs liquidity to target protocols selected for their potential to generate rewards, aligning with allocation weights, parameters, and target protocols defined by Governance.
When the actual and target levels of gigaAssets fall outside of predefined acceptable bounds, Portfolio MS initiates a rebalancing process to maintain protocol stability. This process may involve withdrawing liquidity from certain protocols through the gigaAsset Manager and burning excess gigaAssets to reduce the circulating supply. Alternatively, when more liquidity is needed, a request can be sent to the gigaAsset Manager to mint more gigaAssets and allocate them to the selected protocols.
In addition to target protocols, the Portfolio MS allocates a portion of gigaAssets to AMM pools to ensure that sufficient liquidity is available for users.

Withdraw process step-by-step:
External user sends withdrawal request to the Vault via enjoyoors.xyz.
The Vault emits a corresponding event.
The reaches consensus.
The signs and transmits a message containing withdrawal details to the
The adds withdrawal request to the queue.
The processes the queue in the next epoch and closes / updates a collateralized debt position (CDP).
The aggregates CDPs to calculate actual and target circulating supply of
The emits corresponding event.
The reads the emitted event from .
The recalculates portfolio allocations to target protocols and based on the new circulating supply of .
The decides on liquidity rebalancing base on new portfolio allocation details.
The emits corresponding event.
The reads the emitted event from
The reaches consensus.
The signs and transmits a message containing rebalancing details to the .
The External user requests a claim voucher from the . The claim voucher allows External user to redeem his assets from the .
If the External user has debt External user will receive message from with claim rejection and debt details.
The External user goes to and buys to repay the debt.
The External user repays debt in .
If the External user doesn't have debt he receives claim voucher from .
The External user receives assets from by using claim voucher.

@startuml
autonumber
actor "External user"
participant Vault
participant Relayer
participant "AMM Pool"
participant "gigaCDP"
participant PMS
== Epoch 1 ==
"External user" -> Vault: Send withdraw request
Vault -> Vault: Emit event
Relayer -> Vault: Listen to events
Relayer -> Relayer: Reach consensus
Relayer -> "gigaCDP": Broadcast signed transaction
"gigaCDP" -> "gigaCDP": Add the request to the queue
== Epoch 2 ==
"gigaCDP" -> "gigaCDP": Close / update CDP
"gigaCDP" -> "gigaCDP": Calculate actual and target level of gigaAssets
"gigaCDP" -> "gigaCDP": Emit event
PMS -> "gigaCDP": Get actual and target level of gigaAssets
PMS -> PMS: Recalculate portfolio weights
PMS -> PMS: Decide on gigaAssets liquidity rebalancing
PMS -> PMS: Emit event
Relayer -> PMS: Listen to events
Relayer -> Relayer: Reach consensus
Relayer -> "gigaAsset Manager": Broadcast signed transaction
"External user" -> gigaCDP: Try to receive claim voucher
alt External user bad debt > 0
"gigaCDP" -> "External user": Return reject message with debt details
"External user" -> "AMM Pool": Buy gigaAssets
"External user" -> "gigaCDP": Repay debt
else bad debt = 0
"gigaCDP" -> "External user": Return claim voucher
end
"External user" -> Vault: Claim assets
@endumlAnother promising direction to explore is creating a full-scale DeFi ecosystem based on the Enjoyoors Orchestrator AppChain. The AppChain will operate on top of an established sidechain SDK and can accept future deployments of third-party smart contracts. With the extraordinary TVL potential, Enjoyoors can offer liquidity support on demand and become a home for highly liquid DeFi products.
Supporting this direction, the market lately saw a few successful launches of new blockchain ecosystems based on existing appchains tailored originally for specific projects. Hyperliquid is probably the most exciting benchmark that conducted an ultra-successful community-driven launch, followed by exponential growth to the impressive $9.72B market capitalization at its peak as of writing.
Talking about particular projects that could take the most advantage of launching on Enjoyoors, we can distinguish the following categories:
Money markets
AMMs
Synthetic asset protocols (decentralized stablecoins and others)
RWA projects
Restaking / shared security protocols
Projects rolled out in the Enjoyoors DeFi ecosystem can expect gigaAsset liquidity injections and vast staking opportunities for assets they emitted.
The Auction module facilitates the distribution of rewards to protocol depositors. It operates as follows: collects rewards from . Once these rewards are gathered, transmits the necessary information to the Auction module within the . This module allows any user to initiate an auction and place bids, exclusively using tokens. Users can acquire these tokens through on supported blockchain networks and then bridge them into the using the specialized
At the conclusion of an auction, the winner receives a voucher specifying the blockchain network and the exact quantity of rewards they are eligible to claim. This voucher can then be redeemed at to access the rewards.
The majority of the gigaAsset tokens collected from winning bids are distributed to protocol depositors as rewards for providing liquidity. A smaller portion is allocated to the to ensure the protocol's sustainability and security.

In conclusion, we would like to outline the key priorities for our future efforts to ensure the Enjoyoors protocol’s success and establish it as a foundational component of the crypto space.
Firstly, we are committed to the maximum possible decentralization of the Enjoyoors protocol and will take all necessary actions to foster this mission. The first step toward decentralization for Enjoyoors was designing trustless vaults that are secure and immune to being compromised or drained by transferring user funds to third-party addresses. The next logical step in this critical path is to advance vault orchestration, such as transitioning to AVS and further developing the proprietary L3 network. Lastly, enhancing and decentralizing protocol governance is crucial, ensuring Enjoyoors DAO remains transparent and accessible to everyone who wishes to voice their opinions.
Another key priority for us is excelling in the protocol's cyber security. We have engaged several prominent security audit firms to perform continuous audits of our code base. These partners were meticulously handpicked for their expertise in auditing specific tech stacks and their proven track records. All production vaults and system components are thoroughly tested with extensive coverage and undergo rigorous security audits before deployment. Additionally, the protocol incorporates an automated real-time monitoring system that tracks all activity across Enjoyoors, and it can suspend the protocol’s operations if suspicious actions are detected.
We prioritize openness and inclusivity in Enjoyoors. Instead of forming alliances or being biased against specific ecosystems or projects, we set transparent rules and criteria for potential partners that may engage with the protocol. All new assets or protocols can pass transparent voting by Enjoyoors DAO and be added to the protocol vaults or become eligible for gigaAsset deployments. The above rules in conjunction with the protocol’s risk framework that we covered above ultimately guide the DAO's decisions.
Last but not least, we put our community at the forefront. Our strategic goal is to keep community members informed and educated about the technology behind Enjoyoors and all further developments. For these reasons, we will continuously create articles and other educational content, host regular interactive community events (community calls, AMAs, etc.), and conduct webinars and workshops. We are dedicated to providing real-time community support through social channels like Telegram and X, ensuring that all news and updates are shared promptly as they become available.
Another essential factor for successful gigaAssets adoption is the establishment of secondary markets with deep liquidity for gigaAsset swaps. As the first step, new stableswap pools will pair each gigaAsset with a respective underlying cryptocurrency. To simplify liquidity bootstrapping, we opted to use the final asset in the restaking chain, which is not exposed to additional yield opportunities, as the quote asset. For example, gigaETH will be paired with one of the popular Liquid Restaking Tokens (LRT) instead of native ETH, which is extremely hard and expensive to bootstrap.
In the second step, the protocol will incentivize liquidity providers who bring quote assets to the special module called Intelligent Peg Adapter (IPA). This module adds gigaAssets equivalent to the quote asset contributions from LPs and deploys the resulting liquidity to stableswap pools. All revenue generated in the pools through swaps and staking their LP tokens (e.g., in Convex), alongside additional rewards allocated in the Enjoyoors tokenomics, will be funneled to LPs of quote assets.
In addition to the Curve adapter described, the protocol will operate multiple other IPAs to connect Enjoyoors with external DeFi protocols seamlessly. The IPA design was inspired by Frax’s AMO, which has successfully proven its efficiency. Details of its implementation will be explored in the system architecture section below.
gigaAssets are synthetic assets tracking the price curve of specific crypto assets within the blockchain ecosystem.
Each gigaAsset token corresponds to a synthetic representation of the respective crypto asset (e.g., gigaETH, gigaBTC, etc.). Initially, the protocol will focus on issuing gigaAssets for major cryptocurrencies such as ETH, BTC, and others.
The gigaCDP governs their issuance and management. This core module tracks user deposits into Vaults and regulates the actual and target supply of gigaAsset tokens to be minted by the gigaAsset Manager. The protocol employs various mechanisms to maintain the price of a gigaAsset equal to that of its corresponding fundamental cryptocurrency, such as ETH.
The gigaCDP uses user deposits as collateral to mint gigaAsset tokens while ensuring that the protocol maintains a safe Loan-to-Value (LTV) ratio. This guarantees that every issued gigaAsset token is fully backed by the aggregated value of user positions.
gigaAssets serve as an excellent liquidity source for target protocols, which are selected by Governance based on their potential to deliver attractive returns.
Users can acquire or exchange gigaAsset tokens through AMM pools available on supported blockchain networks.
The Vault is the primary smart-contract deployed across all networks supported by Enjoyoors. It's main function is to collect tokens allowed for deposits into the protocol from users. Users who have staked their tokens can request withdrawals at any time.
The Withdrawal Approver is a smart-contract responsible for managing the withdrawal logic of tokens staked in the Vault. The address of this contract is provided to the Vault and can be updated to any other implementation that adheres to the required interface. In the current implementation, the contract administrator sets the withdrawal delay period (in seconds), which defines the time required to complete a withdrawal after it has been requested.
deposit - this method allows stakers to stake tokens supported by the protocol. It accepts the token address and the amount as parameters.
requestWithdrawal - this method must be called to initiate the withdrawal of staked tokens. It requires the token address and the amount as parameters. In response, a WithdrawalRequested event containing the requestId will be emitted.
claimWithdrawal
requestWithdrawalrequestIdMonad (Testnet)
0x9FacfE94E5f0AD42672eC75a348a376B13Da86e1
0x96f47f31Ac297Ab6CFc2d9aC066c631efcB7c65B
Еthereum
0x59660cb83da31EC23F9d992C11f80Fc527046409
0x8A4E79D2e12D253f6cEFec473439b4b0e98B7c17
This section examines the risks associated with potential adverse market conditions that could impact the protocol's portfolio of assets. Since these risks are external and unavoidable, Enjoyoors must be thoroughly prepared to mitigate their effects and maintain resilience if they materialize.
Risk
Description
Risk mitigation strategy
Volatility Risk
The higher the volatility of the collateral, the less likely it is to support the entire synthetic debt assigned to it
Introduce a statistical modeling framework to calculate historical volatility measures and quantify risk based on returns distribution. Perform VaR (ES) and scenario analysis to identify applicable Portfolio and Market LTV ratios.
Correlation Risk
The higher the correlation between collateral assets, the more it is susceptible to adverse value changes
Track the historical correlation between collateral assets and synthetic liability. Score assets based on how well they are cointegrated with the synthetic liability. Diversify collateral portfolio based on historical correlations, preferring assets with higher diversification benefits.
Liquidity Risk
The less liquidity available in the market, the more likely the price impact will work against realizable value.
Develop a scoring-based factor model considering liquidity on-chain and off-chain, as well as price impact information.
Exposure Risk
The higher the aggregate relative exposure to the supply of any single asset, the more risk in trying to realize its value
Define allocation limits on a per-asset basis. Take into account liquidity scores and volatility measures calculated above. Additionally, circulating supply data should be considered to identify allocation hard caps.
Synthetic supply shock
A big chunk of gigaAsset supply entering the market in a short period could affect its peg. This could happen due to a major slashing event, liquidation of the whale position on the lending protocol, or just because a malicious actor decided to attack the stability of Enjoyoors’ gigaAsset
Since Enjoyoors protocol controls gigaAssets’ circulating supply - it can decide how and on what terms to bootstrap the Сurve pool (making sure that substantial synths supply chunk in the pool is controlled by the IPA).
Additionally, Enjoyoors governance can limit liquidity exposure to specific protocols to cap the amount of potential gigaAsset circulating supply entering the market.
We already touched on Intelligent Peg Adapters (IPAs), specialized contracts set to maintain the stability of the gigaAsset peg. The first IPA the Enjoyoors protocol will support is the Curve Pool IPA. It can deposit or withdraw gigaAssets from a number of gigaAsset liquidity pools approved by governance.
IPAs hold a pre-allocated supply of gigaAsset tokens for peg stabilization efforts. IPA may provide gigaAsset to the pool if the following requirements are met:
Providing is not paused.
gigaAsset price is above 1.0 (in relation to the underlying) or has been consistently above 1.0 over a specified period defined by a protocol.
Price consistency check: the current AMM state price and oracle price of the synthetic must be within a specified deviation range.
IPA may withdraw gigaAsset from the pool if the following requirements are met:
Withdrawals are not paused
gigaAsset price is below 1.0 (in relation to the underlying) or has been consistently below 1.0 over a specified period defined by a protocol.
Price consistency check: the current AMM state price and oracle price of the synthetic must be within a specified deviation range.
Another notable IPA is designed to support pools in external lending protocols. It manages the supply of gigaAssets deployed to lending pools and adjusts the interest rate curve to indirectly incentivize or discourage demand for gigaAssets. This IPA can withdraw funds from the pools to increase liquidity utilization (and interest rates, respectively) or supply additional gigaAssets to lower utilization and stabilize rates as needed.
Here, we focus on risks related to the protocol's technology stack and its potential vulnerabilities. The key pillars of defense against these risks are infrastructure redundancy and a rigorous approach to cybersecurity. Let’s explore how Enjoyoors prepares to address these challenges.
Risk
Description
Risk mitigation strategy
Oracle risk
Inconsistent or corrupt pricing information could lead to unintended synthetic supply shock or the insolvency of specific markets.
Enjoyoors integrates three oracle providers (Pyth, Chainlink, and Redstone) and organizes direct market feeds from a number of CEXes and DEXes.
All of these price feeds are then medianized and monitored in real time for outlier price detection. The failure of any single one or several of them simultaneously will not materially affect the Enjoyoors protocol.
Protocol Risk
Enjoyoors deploys gigaAssets to different protocols and should be aware of risks inherent to those protocols - both technical and non-technical.
Introduce a scoring model to assess protocol quality and security based on (but not limited to) the following factors:
Profitability — how much yield does the protocol earn.
Strategy - how is yield generated, and what are inherent risks to the strategy
Technology — how secure the protocol, its architecture, and codebase are.
Competition — SWOT analysis. Team — Core team and advisors.
Community — Sentiment and engagement analysis.
Business Model — Structural and legal analysis.
Technology risk
Potential for financial or operational loss due to flaws, vulnerabilities, or malicious actions within any part of the Enjoyoors technology (smart contracts, appchain, relayers)
Perform multiple audits and engage in public bug bounty programs plus white hack competitions. Integrate real-time monitoring and alert services with filters and thresholds catering to Enjoyoors use case.
Learn about Rewards Auction in Enjoyoors Protocol.
Auction step-by-step:
The Target Protocol generates rewards and sends them to Rewards Treasury.
The Rewards Treasury emits the corresponding event.
The Relayer reads the event from Rewards Treasury.
The reaches consensus.
The broadcasts signed transaction to the .
The Participant starts an auction.
The Participant makes a bid for opene lots.
The chooses the auction winner.
The Participant receives rewards voucher for winning the auction.
The issues rewards voucher for the winner (Participant).
The sends a portion (determined by Governance) to .
The sends to . These funds are distributed to the depositors as rewards for their participation.
The Winner (Participant) redeems rewards by using rewards voucher from .

@startuml
autonumber
actor Participant
participant "Target Protocol"
participant "Rewards Treasury"
participant Relayer
participant "gigaCDP"
participant "Auction"
participant "Insurance Pool"
"Target Protocol" -> "Rewards Treasury": Send rewards
"Rewards Treasury" -> "Rewards Treasury": Emit event
Relayer -> "Rewards Treasury": Listen to event
Relayer -> Relayer : Reach consensus
Relayer -> "Auction": Broadcast signed transaction
Participant -> "Auction": Start auction
Participant -> "Auction": Make a bid
"Auction" -> "Auction": Choose a winner
Participant -> "Auction": Request rewards voucher
"Auction" -> Participant: Issue the rewards voucher
"Auction" -> "Insurance Pool": Send gigaAssets
"Auction" -> "gigaCDP": Send gigaAssets
Participant -> "Rewards Treasury": Redeem the rewards
"Rewards Treasury" -> Participant: Transfer the rewards
@endumlAnother important aspect of capital and risk management involves establishing rules for gigaAsset deployment, which define target weights for gigaAsset allocations across specific types of DeFi protocols. Adhering to the risk framework, these weights prioritize exposure to more established, lower-risk protocols while minimizing potential risks associated with less familiar or higher-risk ones. The general categories of protocols Enjoyoors works with are shown below:
Protocol Type
Description
Restaking Protocols
gigaAssets will be restaked and earn yield securing different blockchains and decentralized services.
Lending protocols
Single-sided liquidity protocols from which users can borrow gigaAssets. The more interesting use-case is when gigaAssets are used as collateral because they allow for additional exposure for the Enjoyoors protocol due to leverage. (e.g. the protocol could borrow DAI at 3% APY on AAVE against ETH gigaAsset and stake it for 5% APY)
Curve AMMs
The AMM will serve as a primary source of external gigaAsset liquidity. It will earn fees for its Liquidity providers and the Enjoyoors protocol while working with Intelligent Peg Adapters (IPAs) to control the peg of gigaAssets.
Liquidity Seekers
The initial distribution of weights is intentionally conservative. These numbers are subject to change based on risk assessment and governance decisions in the future.
Current distribution weights will be most frequently affected by the increase in synthetic supply (due to liquidity entering the protocol) or the decrease in synthetic supply (due to de-risking or liquidity exiting the protocol).
New protocols
5%
Initially a low allocation to new protocols, liquidity provision for airdrop farming, possibly with liquidity locks.
+/-1%
These are emerging DApps and protocols that strive to build up their TVL and are willing to reward liquidity in their tokens for this.
Protocol Type
Target Weight
Description
Rebalance threshold
Restaking
80%
Most of the liquidity will be funneled to shared security protocols, which offer low yield but on much safer terms than all others. Usually they have unstaking periods of no longer than Enjoyoors epoch of 7 days.
+/-5%
Lending
5%
Small fraction to allow for secondary lending markets. Allocation may be increased when gigaAssets will be accepted as collateral.
+/-1%
AMM + IPA
10%
Both AMM and IPA will hold 5% each pegkeeper can increase or decrease AMM supply to control the peg.
+/-2%